Subscription to the full report on a daily basis can be obtained:
Send an eMail to dhsdailyadmin@mail.dhs.osis.gov with the subject "DHS Daily Open Source Infrastructure Report" and the following line in the body...subscribe.
To obtain a complete copy of the current report proceed to the DHS link below.
To obtain reports more than 10 business days old, send an eMail to DHS_Reports@e-computer-security.com. Be specific as to the reports you wish to receive.

• A report issued August 12 by the White House
and the U.S. Energy Department stated the aging U.S. electricity grid is
extremely vulnerable to blackouts due to extreme weather events fueled by
climate change and severe weather. – Baltimore Sun

2.
August 12, Baltimore Sun – (National) U.S.
electricity grid ‘highly vulnerable’ to blackouts, report says. A report
issued August 12 by the White House and the U.S. Energy Department stated the
U.S. electricity grid is extremely vulnerable to blackouts due to extreme
weather events fueled by climate change. The aging of the grid has made the
public more susceptible to outages caused by severe weather. Source: http://www.baltimoresun.com/business/bs-bz-electricity-grid-20130812,0,4769274.story

• A man accused of participating in the
biggest hacking scheme in U.S. history spanning pleaded not guilty August 12 to
stealing more than 160 million credit card numbers by hacking into
corporations. – CNETSee item 5
below in the Banking and Finance Sector

• Southbound lanes of Interstate 81 in
Lexington, Virginia, were shut down for several hours August 11 after a 2-car
accident led to a pileup of 41 cars, trucks, and other vehicles that left 10
people injured. – Associated Press

• The production and shipment of salad mix and
leafy greens from Taylor Farms de Mexico to the U.S. was stopped August 9 as
the number of individuals infected with in the Cyclospora outbreak went up to
at least 535 in 18 States. – Food Safety News

5. August 12, CNET – (International) Hacker
pleads not guilty to stealing 160M credit cards. A man accused of
participating in the biggest hacking scheme in U.S. history spanning from 2005
to 2012 pleaded not guilty August 12 to stealing more than 160 million credit
card numbers by hacking into corporations and selling the stolen credit card
information to other parties. The Russian national and several others cost the
companies and customers a combined total of more than $300 million. Source: http://news.cnet.com/8301-1009_3-57598232-83/hacker-pleads-not-guilty-to-stealing-160m-credit-cards/

6. August 12, Financial Advisor – (Ohio) Ohio
financial advisor gets 17.5 years in prison for fraud. An Ohio financial
planner was ordered to pay more than $4.4 million in restitution to nearly 100
clients, including charities and churches, and was sentenced to 17.5 years in
prison for financial crimes he committed from 2002 to 2012 through several
businesses and two schemes. Source: http://www.fa-mag.com/news/ohio-financial-advisor-gets-17-5-years-in-prison-for-fraud-15152.html

27. August
13, The Register – (International) Revealed: Simple ‘open sesame’ to unlock your
HOME by radiowave. Researchers identified a vulnerability in the Z-Wave
home-automation standard that allowed them to unlock doors and disable sensors
controlled by the technology through a flaw in the implementation of the
commands sent to the lock from the encrypted network controller using AES128.
Source: http://www.theregister.co.uk/2013/08/13/wave_goodbye_to_security_with_zwave/

30. August
12, IDG News Service – (International) Chinese hacker group behind New York Times
attack returns with updated tools. FireEye researchers believe a Chinese
hacking group responsible for breaking into the New York Times and other
high-profile organizations, launched a new attack using variants of
Backdoor.APT.Aumlib and Backdoor.APT.lxeshe malware programs. The researchers
recommended companies ensure their detection tools are updated to identify new
variants. Source: http://www.networkworld.com/news/2013/081213-chinese-hacker-group-behind-new-272765.html

Links

About Me

U.S. Army Retired Chief Warrant Officer with more than 40 years in information technology and 35 years in information security. Became a Certified Information Systems Security Professional in 1995 and have taught computer security in Asia, Canada and the United States. Wrote a computer security column for 5 years in the 1980s titled "for the Sake Of Security", penname R. E. (Bob) Johnston, which was published in Computer Decisions.
Motto: "When entrusted to process, you are obligated to safeguard"